Wilmington, DE, USA
2021
  |  By Gabriel Avner
There’s never a good time to lose a production database, but losing one to your own AI coding agent on a Friday afternoon has to rank near the bottom of the list. That’s the backdrop to the PocketOS incident, and it’s the clearest case yet for why AI agent security and intent-based access control belong at the top of every cloud security roadmap this year.
  |  By Gabriel Avner
As more organizations move past experimentation and start planning real AI agent deployments, the same set of concerns keeps surfacing in our conversations with security teams. Whether the worry is a shadow agent that shows up uninvited or a sanctioned agent going rogue, the questions tend to cluster around control: These are the right questions to be asking, and they share a common answer that’s more concrete than most people expect. AI agents are only as dangerous as the privileges they can reach.
  |  By The Apono Team
Security teams are losing the battle to secure non-human identities (NHIs) for one simple reason: machine identities are now created inside the systems that ship software. They appear in CI/CD pipelines, Kubernetes workloads, SaaS integrations, and AI-driven workflows faster than central IAM teams can inventory or review them.
  |  By The Apono Team
Governance is breaking. Not because companies care less about risk, but because modern infrastructure moves faster than the controls designed to govern it. In 2026, governance has to keep up with cloud-native architectures, AI adoption, API sprawl, and the explosion of machine identities across production environments.
  |  By The Apono Team
Many engineering teams treat zero trust as a simple MFA checkbox. They invest in advanced identity providers but still leave environments exposed, with permanent admin roles and manual ticket queues that frustrate developers. Most teams have adopted the language of zero trust without changing how access actually works. They verify identity at login, then leave broad permissions in place long after the task is done.
  |  By Thierno Diallo
There’s never a good time to disclose a breach, but days before your IPO has to rank near the bottom of the list. That was the backdrop to the Vercel breach. On Sunday the 19th, the company confirmed that attackers had walked into parts of its internal environment and walked back out with customer API keys. Early reporting focused on the flashy parts: an attacker claiming ties to ShinyHunters, a $2 million BreachForums demand, crypto teams rotating credentials with the IPO roadshow in full swing.
  |  By Gabriel Avner
Hims & Hers, one of the biggest telehealth platforms in the U.S., just disclosed that millions of customer records were exposed. Not because of some sophisticated exploit, but because a single compromised login had standing access to a connected platform. One identity was all it took. This breach is worth paying attention to not because it’s unusual, but because it’s so ordinary.
  |  By Gabriel Avner
Today, we’re introducing Approval Escalation, a new capability in Apono that automatically moves access requests forward when the original approver doesn’t respond in time. Because no one should be stuck waiting seven hours just to do their job.
  |  By Gabriel Avner
Today, we’re introducing Justification Coach, a new AI-powered capability that helps users write better access request justifications in real time, so admins get the context they need for audits and investigations without having to chase people down after the fact.
  |  By The Apono Team
An intern gets admin access to production for a temporary task, but nobody remembers to revoke it. Imagine that intern works at machine speed, never sleeps, and can chain dozens of actions before you’ve read the Slack ping—and has no instinct for when they’re about to do something irreversible.
  |  By Apono
Apono announces the launch of our Admin MCP (Model Context Protocol), a new tool that simplifies organizational access management through natural language queries. The product works with MCP-supported clients like Claude and Cursor, allowing administrators to quickly answer access questions without manually navigating through dashboards and permissions. This demo shows how users can instantly check if someone can access database resources or get comprehensive audit reports for AWS production accounts.
  |  By Apono
Dynamic roles beat pre-created roles. Many “API-based” tools still depend on static roles, which are slow to set up, brittle as things change, and often over or under privileged. Apono creates roles on demand, scoped to the task and auto expiring for zero standing permissions, so teams move fast with least privilege.
  |  By Apono
Here’s a streamlined version: Introducing Apono Access Assistant, our AI companion that speeds up access requests without sacrificing security. It handles three scenarios: mapping tasks to the right permissions, showing you what resources you can reach, and diagnosing permission errors. In this demo you’ll see it resolve an S3 access issue in seconds by creating a temporary read‑only role and revoking it when you’re done.
  |  By Apono
Apono’s Slack integration lets engineers request scoped, least‑privilege JIT access right from Slack—no tickets, no context switching. You’ll see how it creates and tears down access roles automatically while logging every action, so your team stays productive and compliant without sacrificing security. Ready to eliminate standing privileges? Try Apono with Slack today.
  |  By Apono
See how Apono's Cloud Access Security Platform enables teams to automatically assign their resources to the right access provisioning process based on their risk and usage. This ensures that all resources receive the security they need while empowering the business to work freely without undue friction.
  |  By Apono
Hear Labelbox’s Sr. DevOps Engineer Aaron Bacchi share his experience of building out a smarter break-glass infrastructure to respond to incidents by using PagerDuty and Apono.
  |  By Apono
A 2-minute demo on how super simple it is to approve access requests on Slack with Apono.
  |  By Apono
Apono's just-in-time access governance solution supports requesting – and approving – access to cloud resources directly within Slack. Bonus: It’s really, really simple.

Securely manage permissions and adhere to compliance requirements, while allowing employees to benefit from a frictionless user experience.

Apono, led by cybersecurity and DevOps experts. “Apono” is the Hawaiian word for “approve”. The Apono platform is loved by DevOps, trusted by Security - supports customers like OpenWeb, Cybereason, HiredScore, Tomorrow.io and many more in automating permission management. Providing a frictionless experience for users with the visibility and compliance needed by security to win more business.

Turn Manual Permission Management Into Automated Contextual Access Flows:

  • Remove Permission Bottlenecks: Turn manual permission management tasks to automated contextual Apono Access Flows.
  • Leave No Permissions Behind: Take advantage of auto-expiring permissions.
  • Satisfy Customer Requirements: Grant access to specific namespaces or resources with a comprehensive audit log.
  • Prevent Human Errors in Production: Tailor access duration and resources to the task at hand.

Automatic granular permissions needed to keep your business running and secure.